Website of the Honourable Supreme court of Pakistan is hacked, as you can see in the picture, rest of the message of the hacker is as under;

[!] Struck By Zombie_Ksa

YES, Pakistan Supreme Court got STAMPED by Zombie_Ksa.

What i can see, I Guess, Supreme Court of Pakistan is in Wrong,
Untalented Hands !!

Well Why Did I Choose Supreme Court of Pakistan for HaCkinG ?

Just tO Convey my Message tO Mr Chief So Called Justice Of
Pakistan Iftikhar Mohammad Chaudry...

Mr Chief hello0 :D !! Hope So yO Enjoying your full time Luxurious
Life.. :D aint u? O.o
So I am here tO request you to go 0ut there and help
the poor,needy and hungry.
They Dont have money to Eat one time Meal
They
dont Have Clothes to wear
They dont have Accommodation !!

Sitting 0n y0ur r0yal chair w0nt make any changes to 0ur Pakistan

Baby m here tO Tell this mofo World that We are Pakistan ....Not
Pornistan... & Sir i need ur help.. Since u have powefull balls and i
request you to take action to ban porn sites in Pakistan. Read it again I
request you to BAN Pornographic sites in PAKISTAN... PTA is paid whore... they
dont give a damn shit about our complains... They can BAN Porn sites... ANd if
they dont WTF they are paid for? Mr CJ m again requesting you to take somoto
action against PTA. If you dont then i myself will... I will Roast PTA's Asses
like I raped FIA... & If they cant or they wont then InshALLAH I will raise
the 1337 gr33n flag high and ll Hack PTA like i hacked bef0re =) ...

@Webmaster:Mr.Malik Sohail Ahmad The data is intact, no harm done.
The index file is only replaced with this message.Well Dude You Don't Know
Nothing !! Here in PAKISTAN who has Degree He Is Monster and you Idiot is
Webmaster of Supreme Court of PAKISTAN ? Death to U !! Learn Some Serious Shit
Insane !!>

Tuesday, September 13, 2011

Researchers have found a weakness in the AES algorithm. They managed to come up with a clever new attack that can recover the secret key four times easier than anticipated by experts.
The attack is a result of a long-term cryptanalysis project carried out by Andrey Bogdanov (K.U.Leuven, visiting Microsoft Research at the time of obtaining the results), Dmitry Khovratovich (Microsoft Research), and Christian Rechberger (ENS Paris, visiting Microsoft Research).
The AES algorithm is used by hundreds of millions of users worldwide to protect internet banking, wireless communications, and the data on their hard disks. In 2000, the Rijndael algorithm, designed by the Belgian cryptographers Dr. Joan Daemen (STMicroelectronics) and Prof. Vincent Rijmen (K.U.Leuven), was selected as the winner of an open competition organized by the US NIST (National Institute for Standards and Technology). Today AES is used in more than 1700 NIST-validated products and thousands of others; it has been standardized by NIST, ISO, and IEEE and it has been approved by the U.S. National Security Agency (NSA) for protecting secret and even top secret information.

In the last decade, many researchers have tested the security of the AES algorithm, but no flaws were found so far. In 2009, some weaknesses were identified when AES was used to encrypt data under four keys that are related in a way controlled by an attacker; while this attack was interesting from a mathematical point of view, the attack is not relevant in any application scenario. The new attack applies to all versions of AES even if it used with a single key. The attack shows that finding the key of AES is four times easier than previously believed; in other words, AES-128 is more like AES-126. Even with the new attack, the effort to recover a key is still huge: the number of steps to find the key for AES-128 is an 8 followed by 37 zeroes. To put this into perspective: on a trillion machines, that each could test a billion keys per second, it would take more than two billion years to recover an AES-128 key. Note that large corporations are believed to have millions of machines, and current machines can only test 10 million keys per second.
Because of these huge complexities, the attack has no practical implications on the security of user data; however, it is the first significant flaw that has been found in the widely used AES algorithm and was confirmed by the designers.

Sunday, September 11, 2011

Cyber-criminals are using fake e-mails to target Facebook users and deliver computer viruses that were being detected only by one-third of the 42 most common anti-virus products as of 12 noon March 18, says a leading cyber-crime researcher at the University of Alabama at Birmingham (UAB).
Gary Warner, the UAB director of research in computer forensics, says his team in the UAB Spam Data Mine has been tracking the Facebook spam campaign for the past three days. While it is not in the data mine's list of the top 10 most prevalent malware threats, Warner says the fake Facebook messages and related viruses are serious.
"The malware being delivered is called 'BredoLab.' It has been occasionally spread by spam since May of 2009," Warner says. "The UAB Spam Data Mine has observed at least eight versions of the Facebook BredoLab malware since March 16.
"What is troubling is the newer versions of the BredoLab used in this latest attack campaign are not being detected by the majority of anti-virus services -- and that means the majority of users who unwittingly click on the bogus attachments linked to fake e-mails are going to have their computers infected," Warner says.
In this new campaign, cyber-criminals are using regular Internet e-mail services to deliver the false Facebook messages to the social media site's customers. The spam messages ask recipients to open an attachment in order to obtain new Facebook login information. Clicking the attachment exposes a user's computer to the BredoLab malware.
"Once a computer is infected with BredoLab, the cyber-criminals are able to add any other malicious software they desire to the infected computer, including password-stealing software, fake anti-virus software and spam-sending software," Warner says.
Warner warns that any legitimate company would never ask a customer to update his or her personal account information in an e-mail or through e-mail-embedded links or attachments.
"If there are questions about one of your account profiles, visit the site in question through your Web browser and log in as you normally would," he says. "If an entity has an important message for you, you'll be able to find it on its Web page."

Friday, September 9, 2011

Nokia C2-03 combines Dual-SIM functionality with Touch and Type technology. A great phone for those who want to combine their varied ...

This phone is a
touch and type, Dual sim and apparently a slider as well. We have mentioned its
price in Pakistan, however its subject to change and affirmative price will be
released once phone is out in the market in 3rd quarter of year
2011.Update: Phone is now released in Pakistan.